You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers.   Which technical requirement cannot be met when using an iSCSI target?()A、Ensure that the data on the file servers is protected by using BitLocker.B、Ensure that the file servers can access additional storage as a local drive.C、Ensure that new storage solutions are supported by Windows Failover Clustering.D、Ensure that storage can be provisioned without causing any downtime of the file servers.

You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers.   Which technical requirement cannot be met when using an iSCSI target?()

  • A、Ensure that the data on the file servers is protected by using BitLocker.
  • B、Ensure that the file servers can access additional storage as a local drive.
  • C、Ensure that new storage solutions are supported by Windows Failover Clustering.
  • D、Ensure that storage can be provisioned without causing any downtime of the file servers.

相关考题:

You are developing a Windows Presentation Foundation (WPF) application to play audio files. You add MediaElement mediaElement1 and a Button control named btnPlayAudio to the design surface. The MediaElement co.. audio file. The LoadedBehavior attribute is set to Manual.You add the following code to the main Window.You set the command of the button to MediaCommands.Play.You need to ensure that the application will play the audio file when the button is pressed.What should you add to constructor of the main window ?()A.B.C.D.

You are evaluating whether to use express installation files as an update distribution mechanism. Which technical requirement is met by using the express installation files?()A、Newly implemented technologies must minimize the impact on LAN traffic.B、Newly implemented technologies must minimize the storage requirements.C、Newly implemented technologies must minimize the amount of bandwidth used on Internet  connections.D、All patches and updates must be tested in a non-production environment before they are applied to production servers.

In Recovery Manager (RMAN), you have set control file autobackup to ON by using the following command:  CONFIGURE CONTROLFILE AUTOBACKUP ON;  Which two events would cause the control file to be backed up automatically? ()A、a tablespace is taken offlineB、the database instance is restartedC、a new data file is added to an existing tablespaceD、a successful backup is recorded in the RMAN repositoryE、the RMAN connection is disconnected from the target database

Your company has a single Active Directory domain. All servers run Windows Server 2008. You install an iSCSI storage area network (SAN) for a group of file servers.  Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible.  You need to implement the highest security available for communications to and from the iSCSI SAN. What should you do?()A、Create a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.B、Create a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.C、Implement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.D、Implement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.

your company has a main office and two branch offices. Domain controllers in the main office host an active directory-integrated zone. The DNS servers in the branch office host a secondary zone for the domain and use the main office DNS servers as their DNS master servers for the zone. The company adds a new branch office. You add a member server named branch3 and install the DNS service on the server. You configure a secondary zone for the domain. The zone transfer fails. You need to configure DNS to provide zone data to the DNS server in the new branch office. What should you do?()A、Run dnscmd using the zoneresetmasters option.B、Run dnscmd by using the zoneresetsecondaries option.C、Add the new DNS server to the zone transfers tab on one of the DNS servers in the main office.D、Add the new DNS server to the DNSUpdateProxy global security group in active directory users and computers.

A customer has one IBM System Storage DS8700 in their main data center with one DS6800 at a secondary site. They are using the Global Copy feature between the sites. They want to bring up a test image at the secondary site using the primary site data. Which sequence of actions will properly bring up the secondary site?()A、bring up the secondary site on the target disksB、suspend and bring up the secondary site on the target disksC、perform a FlashCopy and bring up the secondary site on the target disksD、"go-to-sync", perform aFlashCopy, and bring up the secondary site on the target disks

Which statements are true regarding the creation of an incident package file by using the EM Workbench Support?()A、 You can add or remove the trace files to the package.B、 You can create the incremental incident package ZIP file for new or modified diagnostic information for the incident package already created.C、 You can add SQL test cases to the incident package.D、 You cannot create an incremental incident package when the physical files are purged rom the ADR.

You are using the control file to maintain information about the database backups that are being performed by Recovery Manager (RMAN). Identify two scenarios is which you must have a recovery catalog.()A、To store the backup information of multiple databaseB、To restrict the amount of space that is used by the backupsC、To maintain a backup for a certain time is set by the CONTROL_FILE_RECORD_KEEP_TIME parameter.D、To list the data files that were in a target database at a given time by using the AT option of REPORT SCHEMA command.

You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()A、A backup of the target database when it is mountedB、A backup of online redo log files when the database is openC、A backup of only used data blocks in the file beingbeingbackup upD、A backup of online, read/write data files when the database is openE、A backup of only those data blocks that have changed since a previous backupF、A backup of online, read/write data files when the database is in the NOMOUNT state.

It is a holiday and no transactions are being performed on the database. You took a consistent backup of your database without using Recovery Manager (RMAN). How would you make use of this consistent backup in RMAN?()A、cannot be used in RMANB、by starting up the database againC、by using the CATALOG command of RMAND、by using the RECOVER CATALOG command in RMANE、by re-creating the target control file to rebuild the RMAN repository

You are using the control file to maintain information about the database backups that are being performed by Recovery Manager (RMAN).Identify two scenarios is which you must have a recovery catalog. ()(Choose two.)A、To store the backup information of multiple databaseB、To restrict the amount of space that is used by the backupsC、To maintain a backup for a certain time is set by the CONTROL_FILE_RECORD_KEEP_TIME parameter.D、To list the data files that were in a target database at a given time by using the AT option of REPORT SCHEMA command.

In Recovery Manager (RMAN), you have set control file autobackup to ON by using the following command: CONFIGURE CONTROLFILE AUTOBACKUP ON; Which two events would cause the control file to be backed up automatically? ()A、 A tablespace is taken offline.B、 The database instance is restarted.C、 A new data file is added to an existing tablespace.D、 A successful backup is recorded in the RMAN repository.E、 The RMAN connection is disconnected from the target database.

You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A、 rman TARGET / NOCATALOGB、 rman TARGET sys/passwordC、 rman TARGET sys/password AS SYSDBAD、 rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

You are evaluating whether to add an additional hard disk drive to each file server and create a striped volume for the data files.   Which storage requirement is met by adding the hard disk drive and creating the striped volume?()A、Improve data availability on the file servers.B、Improve the performance of the file servers.C、Provide additional storage on the file servers without causing downtime.D、Enable users to access the previous versions of all the files stored on the file servers.

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App - V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()A、Create a Distributed File System (DFS) root on each file server.B、On each file server, add the BranchCache for network files role service.C、Create an Active Directory Distributed Fi le System (DFS) root target folder.D、Create a Distributed File System Replication (DFSR) full mesh replication group.

Cer-tech .com hosts a single Active Directory domain. All servers have Windows Server 2008. You areinstructed to install an iSCSI storage area network (SAN) for a group of file servers. Corporate securitypolicy requires that all data communication to and from iSCSI SAN must be very secure. You are assignedthe task to implement the highest security available for communications to and from the iSCSI SAN. Whatshould you do to achieve this task?()A、Create a Group Policy Object (GPO) to enable System objectsB、Create a Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in iSCSIInitiator Properties.C、Open iSCSI Initiator Properties and implement IPSec security. Set up inbound and outbound rules byusing Windows FirewallD、Open iSCSI Initiator Properties and implement Secure Mode transition. Set outbound and inbound rulesby using Windows Defender

You are evaluating whether to deploy Hyper-V.Which technical requirement is NOT met by a Hyper-V deployment?()A、Allocate CPU resources between VMs.B、Simplify the management of all hardware.C、Ensure that the VMs can connect to multiple VLANs.D、Minimize the amount of administrative effort required to convert physical servers to VMs.

You are the network administrator for ExamSheet.  You plan to upgrade 550 computers from Windows 95 to Windows 2000 Professional. You create an Unattend.txt file by using Setup Manager. You copy the file to the network share that will be used to install Windows 2000 Professional. You start the installation on a test computer by using a network shared folder and an answer file. When the installation is complete, you realize that the upgraded computers are not utilizing their entire hard disks.  You want to ensure that the unattended installation utilizes the entire hard drive on all computers. What should you do? ()A、Add an [Unattended] section to Unattend.txt, and set theFileSystemparameter toConvertNTFS. B、Rename Unattend.txt to Cmdlines.txt and copy it to the /$OEM$ subdirectory.C、Add a [GUIRunOnce] section to answer file, and add an entry for the Unattend.txt file.D、Create a /$OEM$/S$ folder on the hard disk of the test computer, and copy Unattend.txt to thefolder.E、Add an [Unattended] section to Unattend.txt, and set theExtendOEMPartitionto1.F、Add an [Unattended] section to Unattend.txt, and set theExtendOEMPartitionparameter to999.

Your company has a main office and two branch offices.Domain controllers in the main office host an Active Directory-integrated zone.The DNS servers in the branch offices host a secondary zone for the domain and use the main office DNS servers as their DNS Master servers for the zone.The company adds a new branch office. You add a member server named Branch3 and install the DNS Server server role on the server. You configure a secondary zone for the domain. The zone transfer fails.You need to configure DNS to provide zone data to the DNS server in the new branch office.What should you do?()A、Run dnscmd by using the ZoneResetMasters option.B、Run dnscmd by using the ZoneResetSecondaries option.C、Add the new DNS server to the Zone Transfers tab on one of the DNS servers in the main office.D、Add the new DNS server to the DNSUpdateProxy Global security group in Active Directory Users and Computers.

You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Your network includes domain controllers, file and print servers, and application servers. The application servers run a variety of programs, including Microsoft SQL Server 2000 and Microsoft Exchange Server 2003. Your staff are responsible for monitoring current system performance on all servers. You need to enable your staff to use System Monitor to gather performance data for each unique server type. The data will be used for trend analysis and forecasting. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、For each server, add the most common performance counters and save them as an HTML file.B、For each server, add the most common performance counters and save them as a counter report file.C、Create trace logs based on the file and schedule and trace logs to gather data.D、Create alerts on the file and schedule the alerts to gather data.E、Create counter logs based on the file and schedule the counter logs to gather data.

Your network contains the servers shown in the following table. Server name S erver role Server location Server share Server1 File server Office1 Data1 Server2 File server Office2 Data2 Office1 and Office2 connect to each other by using a WAN link. Users in Office2 frequently access the same set of files stored in Data1. You need to reduce the amount of file transfer traffic across the WAN link. What should you add to Server1?()A、the Background Intelligent Transfer Service (BITS) featureB、the BranchCache featureC、the BranchCache for network files role serviceD、the Distributed File System (DFS) role service

Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You virtualize applications by using Microsoft Application Virtualization (App-V). You are deploying servers to five new branch offices. Each branch office will stream virtual applications from a local file server and perform application sequencing locally. You need to replicate application packages to all file servers and minimize bandwidth usage. What should you do?()A、Create a Distributed File System (DFS) root on each file server.B、On each file server, add the BranchCache for network files role service.C、Create an Active Directory Distributed File System (DFS) root target folder.D、Create a Distributed File System Replication (DFSR) full mesh replication group.

You need to recommend a file access solution for the Templates share.   Which two actions should you recommend?()A、Add File2 as a namespace server for //fabrikam.com/dfs.B、Add //File2/templates as a folder target for //fabrikam.com/dfs/templates.C、In the Group Policy preferences of GPO2 and GPO3, add new mapped drives.D、Create a DFS Replication group that contains //File1/templates and //File2/templates.

多选题You work as a database administrator for Supportcenter.cn. You are using Recovery Manager (RMAN) to perform backups in your databases. Which four backup operations can be performed using RMAN?()AA backup of the target database when it is mountedBA backup of online redo log files when the database is openCA backup of only used data blocks in the file beingbeingbackup upDA backup of online, read/write data files when the database is openEA backup of only those data blocks that have changed since a previous backupFA backup of online, read/write data files when the database is in the NOMOUNT state.

单选题You want to implement the backup and recovery strategy in your database using Recovery Manager (RMAN). You have chosen the control file of the target database for the RMAN repository.  Which command-line RMAN command would you use to establish a local connection between RMAN and the RMAN repository if your database is using password file authentication?()A rman TARGET / NOCATALOGB rman TARGET sys/passwordC rman TARGET sys/password AS SYSDBAD rman TARGET sys/password@db_name CATALOG rman_user/rman_password@rcat

多选题In Recovery Manager (RMAN), you have set control file autobackup to ON by using the following command:  CONFIGURE CONTROLFILE AUTOBACKUP ON;  Which two events would cause the control file to be backed up automatically? ()Aa tablespace is taken offlineBthe database instance is restartedCa new data file is added to an existing tablespaceDa successful backup is recorded in the RMAN repositoryEthe RMAN connection is disconnected from the target database

单选题You are evaluating whether to add an iSCSI target in the main office to add storage to the file servers.   Which technical requirement cannot be met when using an iSCSI target?()AEnsure that the data on the file servers is protected by using BitLocker.BEnsure that the file servers can access additional storage as a local drive.CEnsure that new storage solutions are supported by Windows Failover Clustering.DEnsure that storage can be provisioned without causing any downtime of the file servers.